Authenticated Resource Management in Delay-Tolerant Networks using Proxy Signatures
Dominik Sch¨ urmann, J¨
- rg Ott, Lars Wolf
Authenticated Resource Management in Delay-Tolerant Networks using - - PowerPoint PPT Presentation
Authenticated Resource Management in Delay-Tolerant Networks using Proxy Signatures Dominik Sch urmann, J org Ott, Lars Wolf March 18, 2013 Motivation Buffer Management Our Approach Evaluation Conclusion Mobile Communication in Rural
Motivation Buffer Management Our Approach Evaluation Conclusion
Mit Mobile Money gegen ”finanzielle Apartheid”. 2009. url: http://www.zeit.de/digital/mobil/2009-11/m-money-africa;
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 1
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 2
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 3
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 3
Motivation Buffer Management Our Approach Evaluation Conclusion
Alice Bob Charlie Trudy Eve Victor
1John Solis et al. “Controlling resource hogs in mobile delay-tolerant networks”. In: Computer Communications
33.1 (May 14, 2010), pp. 2–10. Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 4
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 5
Motivation Buffer Management Our Approach Evaluation Conclusion
drop
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 5
Motivation Buffer Management Our Approach Evaluation Conclusion
Alice Bob Charlie Trudy Eve Victor
drop
drop M1
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 6
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 7
Motivation Buffer Management Our Approach Evaluation Conclusion
drop
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 7
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 8
Motivation Buffer Management Our Approach Evaluation Conclusion
A A B B A warrant ω defines the input space of the proxy signing function certificate pcert = SignskA (00 IDB pkB ω) ciphertext c1 = EncpkB (m1 ω pcert) with m1 as request content request = c1, σ1 = SignskA (11 c1) (forwarded hop-by-hop) decrypt and verify signatures proxy signing key pskB = skB , pkA, (IDB pkB ω), pcert ciphertext c2 = EncpkA (m2) with m2 as response content PSignpskB (c2) = IDB , ω, pkB , pcert, σ2 = SignskB (01 pkA c2) response = c2, Σ = PSignpskB (c2) (forwarded hop-by-hop)
2Alexandra Boldyreva et al. “Secure Proxy Signature Schemes for Delegation of Signing Rights”. In: Journal of
Cryptology 25 (1 2012), pp. 57–115. Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 9
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 10
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 11
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 12
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 12
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 12
Motivation Buffer Management Our Approach Evaluation Conclusion
20 40 60 80 100 percentage of generated request bundles 0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35 0.40 request/response success probability
with proxy signatures without proxy signatures Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 13
Motivation Buffer Management Our Approach Evaluation Conclusion
20 40 60 80 100 percentage of generated request bundles 0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35 0.40 request/response success probability
with proxy signatures, benign nodes with proxy signatures, malicious nodes without proxy signatures, benign nodes without proxy signatures, malicious nodes Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 14
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 15
Motivation Buffer Management Our Approach Evaluation Conclusion
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 15
Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 16
Motivation Buffer Management Our Approach Evaluation Conclusion
1000 2000 3000 4000 5000 generation interval of new requests in seconds 0.0 0.1 0.2 0.3 0.4 0.5 request/response success probability
with proxy signatures without proxy signatures Dominik Sch¨ urmann | Resource Management in DTNs using Proxy Signatures | 17